OWASP Omaha

Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is and open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

This talk focuses on the first three candidates of the 2013 OWASP Top 10. John will demonstrate attack examples, common tools to find these flaws, and consequences that occur without remediation or mitigating controls.

John Rogers is a Senior Application Security Engineer working in the Security Assurance department at Lincoln Financial Group. Previously John worked as a Lead Security Engineer at ACI Worldwide, Inc. John is one of the unique Application Security Professionals with over 20 years of experience in all aspects of the Software Development Lifecycle (SDLC) for the Banking, Payment and Financial Services industries. John is also a Certified Information Systems Security Professional (CISSP) and serves as President of InfraGard Nebraska

Thu Sep 12, 2013 - The OWASP Way: Understanding the OWASP Vision and the Top Ten

Scott a Software Security Engineer for TD Ameritrade. In this role he provides static and dynamic application assessments for over 250 TD Ameritrade front end, back end and mobile applications. Prior to this Scott was the Lead Analyst for TD Ameritrade’s Security Event Center which coordinates incident response within TD Ameritrade. In addition to this Scott is also an Adjunct Instructor for ITT Technical Institute’s Bachelors of Information Security program, and an adjunct Professor for Bellevue University’s Masters of Cyber Security Program. Prior to his current role with Scott was the Chief Security Officer for the Leo A Daly Company. Scott is also a Past President of Nebraska InfraGard, and a graduate of the FBI Citizen’s Academy. Scott received his Bachelor’s Degree in 2003 from Bellevue University in Business Information Systems and his Master’s Degree from the University of Nebraska Omaha in the Management of Information Systems. Upon Graduation Scott was the recipient of the 2007-2008 Outstanding Graduate Student in Information Systems & Quantitative Analysis. Scott is a current CISSP holder in addition to numerous other certification’s from CompTIA and Microsoft.

Thu Dec 5, 2013 - Mobile Application Security Assessments

Presenter, Michael Born, Solutionary

As the world becomes increasingly more 'connected', our digital lives get transmitted through various types of applications including mobile devices. Besides that, the bring your own device debate among security professionals within corporate enterprise environments, maintaining confidentiality, availability, and integrity of data transmitted through these devices must be a continued focus of the security community.

In this presentation, Michael Born, an Associate Security Consultant with Solutionary will walk through a step by step demonstration of setting up and performing a mobile application security assessment on both Android and iOS. Included in the presentation will be an example iOS Security Assessment performed by Michael along with a hands on walk through of a Jailbroken iOS device file system.

-Peter Kiewit Institute, 1110 S. 67th Street, Omaha, NE 68182, Room 279. 12:00 - 1:00 PM. The room will open at 11:45AM.
-Pizza will be provided on a first-come first-serve basis
-UNO has open parking that week, so you will not need to worry about obtaining a pass.

Thu Mar 13, 2014 - Vetting Third Party Vendor Applications

Presenter: John Rogers
This presentation will discuss how to acquire and validate information that will provide assurance that your third party vendor applications adhere to your standards and are free from the common web application vulnerabilities. The discussion will also include what basic requirements are needed to accept a web application security assessment report from an independent security assessment firm.

This talk focuses on the first three candidates of the 2013 OWASP Top 10. John will demonstrate attack examples, common tools to find these flaws, and consequences that occur without remediation or mitigating controls.

John Rogers is a Senior Application Security Engineer working in the Security Assurance department at Lincoln Financial Group. Previously John worked as a Lead Security Engineer at ACI Worldwide, Inc. John is one of the unique Application Security Professionals with over 20 years of experience in all aspects of the Software Development Lifecycle (SDLC) for the Banking, Payment and Financial Services industries. John is also a Certified Information Systems Security Professional (CISSP) and serves as President of InfraGard Nebraska

Upcoming Events

Data breaches and payment card compromises are more frequent, high-profile, and damaging. The every day consumer has been hit by large data breaches at Target, Michaels, and Aaron Brothers, among others. People all around us can testify to the effects of millions of credit cards in the wrong hands. It has become commonplace.

The PCI Security Standards Council (PCI SSC) security standards has recently released a new and improved set of requirements and standards for any organization that processes, transmits, or stores payment card data. PCI DSS' infamous Requirement 6 focuses on secure systems and applications, including secure coding and web application firewalls. OWASP has been noted in the PCI DSS as a trusted resource for secure coding and application vulnerability management. Join us for our next OWASP Omaha chapter meeting as we explore the some of these resources and discuss ways that OWASP can help meet this requirement.